Sciweavers

33 search results - page 4 / 7
» Proposal of BCM Evaluation Method Based on Disaster Scenario...
Sort
View
GLOBECOM
2006
IEEE
14 years 2 months ago
A Coverage-Preserving and Hole Tolerant Based Scheme for the Irregular Sensing Range in Wireless Sensor Networks
— Coverage is an important issue related to WSN quality of service. Several centralized/decentralized solutions based on the geometry information of sensors and under the assumpt...
Azzedine Boukerche, Xin Fei, Regina Borges de Arau...
BMCBI
2010
118views more  BMCBI 2010»
13 years 8 months ago
Detecting lateral gene transfers by statistical reconciliation of phylogenetic forests
Background: To understand the evolutionary role of Lateral Gene Transfer (LGT), accurate methods are needed to identify transferred genes and infer their timing of acquisition. Ph...
Sophie S. Abby, Eric Tannier, Manolo Gouy, Vincent...
INFOCOM
2007
IEEE
14 years 2 months ago
Evolutionary Approaches To Minimizing Network Coding Resources
Abstract— We consider the problem of minimizing the resources used for network coding while achieving the desired throughput in a multicast scenario. Since this problem is NPhard...
Minkyu Kim, Muriel Médard, Varun Aggarwal, ...
VTS
2005
IEEE
145views Hardware» more  VTS 2005»
14 years 2 months ago
Hardware Results Demonstrating Defect Detection Using Power Supply Signal Measurements
The power supply transient signal (IDDT) method that we propose for defect detection analyze regional signal variations introduced by defects at a set of power supply pads on the ...
Dhruva Acharyya, Jim Plusquellic
MIR
2006
ACM
178views Multimedia» more  MIR 2006»
14 years 2 months ago
Dual diffusion model of spreading activation for content-based image retrieval
This paper introduces a content-based information retrieval method inspired by the ideas of spreading activation models. In response to a given query, the proposed approach comput...
Serhiy Kosinov, Stéphane Marchand-Maillet, ...